Cybersecurity, Bachelor of Science
Philosophy
Everything we do in our day-to-day activities somehow relies on the Internet. As customers, we rely on this connectivity in our daily lives to shop, manage our bank accounts, communicate and have fun. Businesses succeed on their ability to use data and Internet connectivity in novel and efficient ways. However, whereas the Internet is a boon to customers and businesses alike, it has also proven to be a powerful tool for cyber criminals. Unchecked, a business can be ruined by a data breach and lives can be ruined through identity theft. The power of the Internet goes beyond national borders and has become a key component of the military arsenal. To protect themselves, government, industry and the military seek professionals with the strongest security credentials possible.
The B.S. in Cybersecurity program (formerly Computer & Network Security B.S.) provides a firm foundation in cybersecurity while also providing the flexibility for students to customize their degree according to their specific areas of interest. As an example, students may earn a Digital Forensics Concentration by choosing six Security Elective Courses. While the Security Core and Security Electives provide a technical foundation for the student, the General Education and Support cores provide the student with the soft skills necessary for a well rounded education.
Purpose
Information Security is listed among the fastest growing occupations by the US Department of Labor Statistics (BLS). According to the BLS, the number of people employed as information security analysts is projected to increase by 33% between 2020 and 2030, "much faster than the average for all occupations". To put it in perspective, that is two and a half times more than the projected growth for computer occupations and more than quadruple the projected growth rate for all occupations.
See https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-6 for more details.
The workforce need was further highlighted by cyberseek.org, which listed 597,767 job openings nationwide in cybersecurity-related positions as of February 2022.
For more information on cybersecurity career paths and a heat map showing supply and demand for cybersecurity jobs, see https://www.cyberseek.org
Center of Academic Excellence (CAE)
The Cybersecurity Bachelor of Science program has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2028 by the National Security Agency and the Department of Homeland Security.
This is a nationally recognized designation that Wilmington University’s B.S. in Cybersecurity curricula, faculty, outreach and academic activities meet the rigorous standards established by the National Security Agency and the Department of Homeland Security. The goal of the National Centers of Academic Excellence designation program is to promote higher education in Information Assurance (IA) and Cyber Defense (CD) and prepare a growing number of IA/CD professionals to meet the need to reduce vulnerabilities in the Nation’s information systems.
Highly Ranked Program
Whereas the Cybersecurity B.S. program is offered both face-to-face and online, Wilmington University's online Cybersecurity B.S. program is ranked in the top twenty on several websites including:
https://thebestschools.org/rankings/best-online-bachelors-information-assurance-security/
https://cybersecuritydegrees.com/rankings/top-online-bachelors-cyber-security/
Program Competencies
Students completing the Cybersecurity B.S. program will be able to:
- Apply the ethical principles required of computer professionals;
- Solve cybersecurity problems using required skills and knowledge;
- Analyze requirements for cybersecurity projects using best practices and current methodologies;
- Employ current and accepted processes to analyze, design, implement, test and deliver cybersecurity projects;
- Apply generally current and accepted best practices in cybersecurity projects;
- Evaluate and employ appropriate informational resources that are generally accepted as legitimate and valid;
- Appraise the needs of the audience and then speak in a clear and succinct manner. Research, construct, and deliver professional presentations using a variety of communication tools and techniques;
- Write with clarity and precision using correct English grammar: mechanics and usage. Correctly and ethically exhibit competence in writing for specific purposes, diverse audiences, and genres; and
- Digital Forensics: Image, process and analyze digital evidence, and properly document findings.
What You Will Learn
In addition to becoming well-prepared for the technical aspects of a career in cybersecurity, students will develop soft skills. Critical thinking skills are needed to understand cybersecurity problems, risks and solutions. Good written and oral communications skills are needed to put technical problems in terms that worker bees can understand and appreciate so that they can stay out of harm’s way. Most importantly, non-technical decision makers in charge of the budget need to understand the risks and the ramifications of not properly investing in cybersecurity.
The Cybersecurity Bachelor of Science degree will provide students with credentials specializing in information security and will also help prepare students to “sit” for the following industry recognized certifications:
- CISA - Certified Information System Auditor
- CISSP - Certified Information Systems Security Professional
- Security+
- CEH - Certified Ethical Hacker
- Network+
- A+
- Linux+
What You Can Do With this Degree
The categories of jobs involving cybersecurity are very broad. The federal government initiated an effort called the National Cybersecurity Framework a few years ago to help provide some clarity and structure. The following sample job titles are taken from this framework (https://niccs.cisa.gov/workforce-development/cyber-career-pathways) and are among the roles for which the Cybersecurity B.S. program helps prepare students:
- Computer Crime Investigator
- Computer Network Defense Forensic Analyst
- Computer Support Specialist
- Computer Systems Analyst
- Cybersecurity Intelligence Analyst
- Digital Forensic Examiner
- Ethical Hacker
- Incident Analyst
- Information Security Analyst
- Intrusion Analyst
- Intrusion Detection System Administrator
- Network Administrator
- Network Analyst
- Network Defense Technician
- Network Forensic Examiner
- Network Security Specialist
- Penetration Tester
- Risk/Vulnerability Analyst
- Security Administrator
- Security Engineer
- Security Specialist
- Systems Analyst
- Systems Engineer
- Systems Security Analyst
- Technical Support Specialist
Experiential Learning
The Office of Experiential Learning takes a 360◦ approach to experiential learning. Whether you come to Wilmington University with a vast amount of professional experience and are awarded Credit for Prior Learning (CPL), or you participate in a Work-Integrated Learning (WIL) opportunity (Internships or Cooperative Education) embedded in your curriculum for credit, we provide a pathway to completing your degree.
Cooperative Education Option
The Cooperative Education Option is an alternative to Cybersecurity Internship - SEC 490 and SEC 491 – for a total of six credit hours. Each co-op assignment is one semester long and normally the two co-op assignments span two consecutive semesters with the same employer. In order to be eligible, students must first have at least 60 credits, plus a GPA of 2.5 or higher. Students must contact the Office of Work-Integrated Learning and their Program Chair one semester before they would like to begin a co-op assignment. For additional information on cooperative education, please visit: https://www.wilmu.edu/coel/work-integrated-learning.aspx
Minimum Grade Policy
The B.S. in Cybersecurity program has set a minimum passing grade of “C-” for Security Core and Security Elective and College of Technology Elective courses. Students receiving a grade lower than “C-” in any of these courses must retake that course.
Accelerated Graduate Certificate Option
Students in the Cybersecurity B.S. degree program may choose an accelerated option with:
- SCADA Cybersecurity Graduate Certificate
Students selecting this option can complete both their undergraduate degree and the graduate certificate by completing 120 credits (105 undergraduate credits and 15 graduate credits). The five graduate courses (15 credits) needed for the graduate certificate count as five courses (15 credits) towards undergraduate electives in your degree.
Students who complete the SCADA Cybersecurity Graduate Certificate also receive the benefit of completing 4-5 graduate level courses that count towards a Master’s degree in Cybersecurity. Students selecting this option are not required to pursue the Cybersecurity M.S. degree.
Admission requirements include:
- A minimum GPA of 3.25
- Completion of at least 60 credits towards your degree program
- A meeting with an academic advisor to submit an Accelerated Option Intent (AOI) form upon completion of at least 30 credits; and
- Recommendation of the Program Chair
Note: Students will not be eligible to register for graduate level courses until they have successfully completed at least 60 credits towards their bachelor’s degree and have an approved AOI form. Students must receive their B.S. degree in order to receive the graduate certificate.
Minimum Grade Policy: Students must maintain a 3.0 GPA in their graduate courses in order to earn the certificate.
Cybersecurity B. S. Curriculum
General Education Requirements (39 credits)
The Cybersecurity program has set a minimum passing grade of “C-” for Security Core and Security Elective and College of Technology Elective courses. Students receiving a grade lower than “C-” in any of these courses must retake that course.
Science Elective
Choose one SCI course (3 credits) except SCI321.
Humanities Electives
Choose two courses (6 credits) from:
ART, COM 245, CUL, DRA, DSN 110, ETN, HIS 230, HUM, LIT, MUS, PHI, SPA, TEC 215, VFP 313
Support Core (9 credits)
Security Core (39 credits)
The Cybersecurity program has set a minimum passing grade of "C-" for Security Core and Security Elective courses. Students receiving a grade lower than "C-" in any of these courses must retake that course.
CSC 345 | Database Foundations | 3 |
SEC 100 | Introduction to Computer Hardware and Operation | 3 |
SEC 210 | Principles and Practice of Information Security | 3 |
SEC 230 | Introduction to Linux | 3 |
SEC 235 | Networks and Telecommunications | 3 |
SEC 250 | Operating System and Computer Systems Security | 3 |
SEC 290 | Introduction to Programming with Python | 3 |
SEC 310 | Cryptography: Algorithms and Applications | 3 |
SEC 335 | Linux for Systems Administrators | 3 |
SEC 340 | Windows Operating Systems and Systems Administration | 3 |
SEC 410 | Web and Data Security | 3 |
SEC 450 | Firewalls and Network Security | 3 |
| | |
SEC 480 | Experiential Learning in Cybersecurity | 3 |
| OR | |
SEC 490 | Cybersecurity Internship | 3 |
Digital Forensics Concentration (18 Credits)
Whereas the bulk of the Cybersecurity B.S. degree is devoted to defending against cyber attacks, digital forensics is used in the investigation of a crime or incident. In law enforcement, digital evidence found on computers, phones, laptops, Fitbits, Alexa, smart refrigerators, etc. is used to prosecute crimes. In the corporate world, digital forensics is used to investigate data breaches, intellectual property theft, corporate espionage and malicious employees among other things; sometimes the goal is to prosecute, sometimes not. The intelligence community, on the other hand, is not interested in prosecuting. Instead, the goal is to obtain actionable intel, such as in the pursuit of terrorist organizations and espionage activities by hostile nation states.
The Cybersecurity program has set a minimum passing grade of "C-" for Security Core and Security Elective courses. Students receiving a grade lower than "C-" in any of these courses must retake that course.
Those interested in declaring a Digital Forensics Concentration should select six (6) of the following eight Security Elective courses:
LES 331 | Electronic Discovery | 3 |
SEC 240 | Foundations in Cyber Investigations | 3 |
SEC 350 | Introduction Computer Forensics | 3 |
SEC 355 | Mobile Device Security and Forensics | 3 |
SEC 360 | Advanced Mobile and IoT Forensics | 3 |
SEC 370 | Computer Incident Response Course | 3 |
SEC 375 | Malware Analysis Techniques | 3 |
SEC 440 | Network Forensics | 3 |
Note: Students interested in declaring a Digital Forensics Concentration but who do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
Students declaring a Digital Forensics Concentration may also earn two certificates: Digital Evidence Discovery and Digital Evidence Investigation by taking three additional courses: LES 330 – Cyber Law, SEC 360 – Advanced Mobile Device, and IoT Forensics and SEC 375 – Malware Analysis Techniques. For more information, see the section on Digital Evidence Discovery and Digital Evidence Investigation Certificates.
Cybersecurity - No Concentration (18 credits)
Students must complete five (5) Security Electives and one free or College of Technology elective in order to satisfy the requirements of the degree.
The Cybersecurity program has set a minimum passing grade of "C-" for Security Core and Security Elective courses. Students receiving a grade lower than "C-" in any of these courses must retake that course.
Security Electives
Graduate courses in this Security Electives list (IST 7060, IST 7100, SEC 6080, SEC 6082, SEC 6084, SEC 6086) are required courses for the SCADA graduate certificate. Cybersecurity B.S. students must be approved for the accelerated SCADA certificate prior to registration. Contact your advisor for more information.
LES 330 | Cyberlaw | 3 |
LES 331 | Electronic Discovery | 3 |
SEC 240 | Foundations in Cyber Investigations | 3 |
SEC 305 | Psychology of a Cyber Attacker | 3 |
SEC 325 | Breaking Down Cloud Security | 3 |
SEC 326 | Cloud Architecture, Reliability & Economics | 4 |
SEC 327 | Cloud Services & Tools | 4 |
SEC 328 | Cloud Operations & Performance | 4 |
SEC 329 | Cloud Practitioner Certificate (CPC) Exam Review | 1 |
SEC 350 | Introduction Computer Forensics | 3 |
SEC 355 | Mobile Device Security and Forensics | 3 |
SEC 360 | Advanced Mobile and IoT Forensics | 3 |
SEC 370 | Computer Incident Response Course | 3 |
SEC 375 | Malware Analysis Techniques | 3 |
SEC 420 | Data Integrity and Disaster Recovery | 3 |
SEC 425 | Ethical Hacking | 3 |
SEC 435 | Advanced Network Management | 3 |
SEC 440 | Network Forensics | 3 |
SEC 465 | Cybersecurity and IoT | 3 |
SEC 480 | Experiential Learning in Cybersecurity | 3 |
SEC 490 | Cybersecurity Internship | 3 |
SEC 491 | Cybersecurity Internship | 3 |
UAV 100 | Intro to Drone Operations | 3 |
UAV 102 | Drone Design and Maintenance | 3 |
UAV 200 | Security of UAV and UAS Systems | 3 |
IST 7060 | Project and Change Management | 3 |
IST 7100 | IT Policy and Strategy | 3 |
SEC 6080 | Industrial Control Systems (ICS) Security | 3 |
SEC 6082 | SCADA Architecture | 3 |
SEC 6084 | SCADA Risk Management and Auditing | 3 |
SEC 6086 | SCADA Security Awareness and Standards | 3 |
College of Technology Elective
Choose one course (3 credits) from the following:
CSC, CTA, GMD, ISM, MIS, SEC, TEC
Free Electives (15 credits)
Students with less than 16 transfer credits are required to take FYE 101 as one of their electives.
Completion Degree Requirements
What is a Completion Degree?
A completion degree is a personalized version of a bachelor's degree created exclusively for students who have completed an associate degree at an accredited institution. Completion degrees are available for most Wilmington University Bachelor of Science degrees. A student who expects to transfer a completed associate degree should communicate with a Wilmington University academic advisor before registering for courses. A transcript with documentation of the conferred degree must be received by Wilmington University to confirm eligibility.
Note that a minimum of 120 combined credits are needed to satisfy the Completion Degree requirements, including both transfer credits and credits earned at Wilmington University.
Cybersecurity - Digital Forensics Concentration Completion Degree
The Cybersecurity - Digital Forensics degree completion program has set a minimum passing grade of "C-" for required courses, electives and prerequisites. Students receiving a grade lower than "C-" in any CSC, SDD, SEC or LES course must retake that course.
CSC 345 | Database Foundations | 3 |
MAT 308 | Inferential Statistics | 3 |
PHI 314 | Ethics for Computer Professionals | 3 |
SEC 310 | Cryptography: Algorithms and Applications | 3 |
SEC 335 | Linux for Systems Administrators | 3 |
SEC 340 | Windows Operating Systems and Systems Administration | 3 |
SEC 410 | Web and Data Security | 3 |
SEC 450 | Firewalls and Network Security | 3 |
| | |
SEC 480 | Experiential Learning in Cybersecurity | 3 |
OR
| | |
SEC 490 | Cybersecurity Internship | 3 |
Students will also complete 6 courses from the following:
LES 331 | Electronic Discovery | 3 |
SEC 240 | Foundations in Cyber Investigations | 3 |
SEC 350 | Introduction Computer Forensics | 3 |
SEC 355 | Mobile Device Security and Forensics | 3 |
SEC 360 | Advanced Mobile and IoT Forensics | 3 |
SEC 370 | Computer Incident Response Course | 3 |
SEC 375 | Malware Analysis Techniques | 3 |
SEC 440 | Network Forensics | 3 |
Note: Students interested in declaring a Digital Forensics concentration and that do not have enough available elective credits may request a waiver on the SEC480/490 requirement.
The following courses or their equivalents are prerequisites for a degree in Computer and Network Security:
CTA 206 Computer Applications
ENG 122 English Composition II
MAT 205 Introductory Survey of Mathematics
SEC 100 Introduction to Computer Hardware and Operation
SEC 210 Principles and Practices of Information Security
SEC 230 Introduction to Linux
SEC 235 Networks and Telecommunication
SEC 250 Operating System and Computer Systems Security
SEC 290 Introduction to Programming with Python
Cybersecurity Completion Degree
The Cybersecurity degree completion program has set a minimum passing grade of "C-" for required courses, electives and prerequisites. Students receiving a grade lower than "C-" in any CSC, SDD, SEC or LES course must retake that course.
CSC 345 | Database Foundations | 3 |
MAT 308 | Inferential Statistics | 3 |
PHI 314 | Ethics for Computer Professionals | 3 |
SEC 310 | Cryptography: Algorithms and Applications | 3 |
SEC 335 | Linux for Systems Administrators | 3 |
SEC 340 | Windows Operating Systems and Systems Administration | 3 |
SEC 410 | Web and Data Security | 3 |
SEC 450 | Firewalls and Network Security | 3 |
| | |
SEC 480 | Experiential Learning in Cybersecurity | 3 |
| OR | |
SEC 490 | Cybersecurity Internship | 3 |
| | |
| Security Elective | 3 |
| Security Elective | 3 |
| Security Elective | 3 |
| Security Elective | 3 |
| Security Elective | 3 |
| CoT Elective | 3 |
The following courses or their equivalents are prerequisites for a degree in Computer and Network Security:
CTA 206 Computer Applications
ENG 122 English Composition II
MAT 205 Introductory Survey of Mathematics
SEC 100 Introduction to Computer Hardware and Operation
SEC 210 Principles and Practices of Information Security
SEC 230 Introduction to Linux
SEC 235 Networks and Telecommunication
SEC 250 Operating System and Computer Systems Security
SEC 290 Introduction to Programming with Python
Security Electives
Graduate courses in this Security Electives list (IST 7060, IST 7100, SEC 6080, SEC 6082, SEC 6084, SEC 6086) are required courses for the SCADA graduate certificate. Cybersecurity B.S. students must be approved for the accelerated SCADA certificate prior to registration. Contact your advisor for more information.
LES 330 | Cyberlaw | 3 |
LES 331 | Electronic Discovery | 3 |
SEC 240 | Foundations in Cyber Investigations | 3 |
SEC 305 | Psychology of a Cyber Attacker | 3 |
SEC 325 | Breaking Down Cloud Security | 3 |
SEC 326 | Cloud Architecture, Reliability & Economics | 4 |
SEC 327 | Cloud Services & Tools | 4 |
SEC 328 | Cloud Operations & Performance | 4 |
SEC 329 | Cloud Practitioner Certificate (CPC) Exam Review | 1 |
SEC 350 | Introduction Computer Forensics | 3 |
SEC 355 | Mobile Device Security and Forensics | 3 |
SEC 360 | Advanced Mobile and IoT Forensics | 3 |
SEC 370 | Computer Incident Response Course | 3 |
SEC 375 | Malware Analysis Techniques | 3 |
SEC 420 | Data Integrity and Disaster Recovery | 3 |
SEC 425 | Ethical Hacking | 3 |
SEC 435 | Advanced Network Management | 3 |
SEC 440 | Network Forensics | 3 |
SEC 465 | Cybersecurity and IoT | 3 |
SEC 480 | Experiential Learning in Cybersecurity | 3 |
SEC 490 | Cybersecurity Internship | 3 |
SEC 491 | Cybersecurity Internship | 3 |
UAV 100 | Intro to Drone Operations | 3 |
UAV 102 | Drone Design and Maintenance | 3 |
UAV 200 | Security of UAV and UAS Systems | 3 |
IST 7060 | Project and Change Management | 3 |
IST 7100 | IT Policy and Strategy | 3 |
SEC 6080 | Industrial Control Systems (ICS) Security | 3 |
SEC 6082 | SCADA Architecture | 3 |
SEC 6084 | SCADA Risk Management and Auditing | 3 |
SEC 6086 | SCADA Security Awareness and Standards | 3 |